Towards Autonomic Security Management of Healthcare Information Systems

被引:9
|
作者
Chen, Qian [1 ]
Lambright, Jonathan [1 ]
Abdelwahed, Sherif [2 ]
机构
[1] Savannah State Univ, Dept Engn Technol, Savannah, GA 31404 USA
[2] Mississippi State Univ, Dept Elect & Comp Engn, Mississippi State, MS 39762 USA
关键词
D O I
10.1109/CHASE.2016.58
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
With the fast development of information and communication technologies over the past decade, Healthcare Information Technology (HIT) has been widely implemented for health stakeholders to access, modify, share Electronic Health Records (EHR) with a low cost of the facility, data and application maintenance. Due to the high value of healthcare data and lack of investment in cyber security, vulnerabilities of Healthcare Information Systems (HISs), especially data of EHR systems are exposed to attackers [1], [2]. This paper first introduces the network structure of the HIS and the communication standards for health data transmission among patients, hospitals, pharmacies, and insurance companies. After that, we introduce the Health Level 7 (HL7) standard in details and discuss the current security challenges of HISs. We also illustrate how to simulate attacks that exploit HL7 message vulnerabilities. An Autonomic Security Management (ASM) approach is designed for proactively self-protecting a HIS from internal and external attacks. The performance of a HIS can be monitored in real time, and potential attacks that may disrupt HIS services are predicted by the intrusion estimation module. The functionality and feasibility of intrusion detection systems for detecting known and unknown cyber attacks threatening the confidentiality and integrity of EHRs are presented. The intrusion response system of the ASM approach selects the most appropriate protection mechanisms to recover the compromised HIS back to normal with little or no human intervention.
引用
收藏
页码:113 / 118
页数:6
相关论文
共 50 条
  • [21] Security aspects in healthcare information systems: A systematic mapping
    Fatima, Aqsa
    Colomo-Palacios, Ricardo
    [J]. CENTERIS 2018 - INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS / PROJMAN 2018 - INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT / HCIST 2018 - INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERI, 2018, 138 : 12 - 19
  • [22] High level security policies for healthcare information systems
    Katsikas, S
    Kokolakis, S
    [J]. ADVANCED HEALTH TELEMATICS AND TELEMEDICINE: THE MAGDEBURG EXPERT SUMMIT TEXTBOOK, 2003, 96 : 98 - 104
  • [23] Addressing the problem of data security in healthcare information systems
    Furnell, SM
    Sanders, PW
    Warren, MJ
    [J]. CURRENT PERSPECTIVES IN HEALTHCARE COMPUTING, CONFERENCE, 1997, : 55 - 62
  • [24] Information security of healthcare systems: using a biometric approach
    Andreeva, E.
    [J]. MODELLING IN MEDICINE AND BIOLOGY X, 2013, 17 : 109 - 115
  • [25] Security of healthcare information systems based on the CORBA middleware
    Blobel, B
    Holena, M
    [J]. MEDICAL INFORMATICS EUROPE '97: PARTS A & B, 1997, 43 : 10 - 14
  • [26] Enhancing security and improving interoperability in healthcare information systems
    Gritzalis, DA
    [J]. MEDICAL INFORMATICS, 1998, 23 (04): : 309 - 323
  • [27] A baseline security policy for distributed healthcare information systems
    Gritzalis, D
    [J]. COMPUTERS & SECURITY, 1997, 16 (08) : 709 - 719
  • [28] Experiences with a new security standard for Healthcare Information Systems
    Louwerse, K
    van Ditmarsch, M
    Flikkenschild, E
    [J]. MEDICAL INFORMATICS EUROPE '99, 1999, 68 : 311 - 314
  • [29] High level security policies for healthcare information systems
    Katsikas, Sokratis
    Kokolakis, Spyros
    [J]. Studies in Health Technology and Informatics, 2003, 96 : 98 - 104
  • [30] Baseline security policy for distributed healthcare information systems
    Athens Univ of Economics and, Business, Athens, Greece
    [J]. Comput Secur, 8 (709-719):